CVE-2021-4307

Source
https://cve.org/CVERecord?id=CVE-2021-4307
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-4307.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2021-4307
Aliases
Published
2023-01-07T20:15:09.623Z
Modified
2026-02-09T22:16:21.412318Z
Severity
  • 9.8 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

A vulnerability was found in Yomguithereal Baobab up to 2.6.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality. The manipulation leads to improperly controlled modification of object prototype attributes ('prototype pollution'). The attack can be launched remotely. Upgrading to version 2.6.1 is able to address this issue. The patch is named c56639532a923d9a1600fb863ec7551b188b5d19. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-217627.

References

Affected packages

Git / github.com/yomguithereal/baobab

Affected versions

2.*
2.0.0
2.0.1
2.1.0
2.1.1
2.1.2
2.2.0
2.2.1
2.3.0
2.3.1
2.3.2
2.3.3
2.3.4
2.4.0
2.4.1
2.4.2
2.4.3
2.5.0
2.5.1
2.5.2
2.5.3
2.6.0

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-4307.json"